Author:
Kalita Bikash,Sarma Pankaj Kumar Deva
Publisher
Springer Nature Switzerland
Reference50 articles.
1. Alqudah, N., Yaseen, Q.: Machine learning for traffic analysis: a review. Procedia Comput. Sci. 170, 911–916 (2020). https://doi.org/10.1016/j.procs.2020.03.111
2. Geetha, R., Thilagam, T.: A review on the effectiveness of machine learning and deep learning algorithms for cyber security. Arch. Comput. Meth. Eng. 28(4), 2861–2879 (2021). https://doi.org/10.1007/s11831-020-09478-2
3. Rakshe, T., Gonjari, V.: Anomaly based network intrusion detection using machine learning techniques. Int. J. Eng. Res. Technol. 6(5), 216–220 (2017). www.ijert.org
4. Loukas, G., Gelenbe, E.: Detecting denial of service attacks with bayesian classifiers and the random neural network. In: 2007 IEEE International Fuzzy Systems Conference, pp. 1–6 (2007). https://doi.org/10.1109/FUZZY.2007.4295666
5. Liao, H.-J., Lin, C.-H.R., Lin, Y.-C., Tung, K.-Y.: Intrusion detection system: a comprehensive review. J. Network Comput. Appl. 36(1), 16–24 (2013). https://doi.org/10.1016/j.jnca.2012.09.004